Skip to content
Image of person typing
Photo courtesy of Nutdanai Apikhomboonwaroot freedigitalphotos.com

Managing Your Online Privacy

Have you ever wondered what happens to your personal information when you enter it online? Many websites require users to sign up for an account by entering identification material such as a name, address, email or even credit card numbers. Before you provide sensitive information online consider:

  • Who is receiving the data?
  • Is the information stored securely?
  • Is the data pertinent to the use of the website?
  • Does the company sell user information to outside businesses?
  • In most cases, these questions can be answered by reading the website’s Privacy Policy. A Privacy Policy is a statement which discloses to users the method(s) used to collect data and what happens to that data after the website receives it. A website’s Privacy Policy is often accessed through a link at the bottom of the webpage. For example, you can read Richland Library’s Policy by clicking on the link that reads “Privacy Policy” located at the bottom left of the page.

    For more information about internet safety and Privacy Policies please see the related resources listed below.


    Amazon Says: Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the av more...
    Amazon Says: Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis. Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the function and impact of security in everyday life. The authors offer practical computer security knowledge on a range of topics, including social engineering, email, and online shopping, and present best practices pertaining to passwords, wireless networks, and suspicious emails. They also explain how security mechanisms, such as antivirus software and firewalls, protect against the threats of hackers and malware. While information technology has become interwoven into almost every aspect of daily life, many computer users do not have practical computer security knowledge. This hands-on, in-depth guide helps anyone interested in information technology to better understand the practical aspects of computer security and successfully navigate the dangers of the digital world. less...
    Amazon


    Cyberstalking and Cyberbullying by Samuel McQuade III PhD
    Amazon Says: In the past, teens bullied each other in neighborhoods or on school grounds. Now, they can use the Internet to intimidate others, which is not as easily detected or investigat more...
    Amazon Says: In the past, teens bullied each other in neighborhoods or on school grounds. Now, they can use the Internet to intimidate others, which is not as easily detected or investigated by parents or other adults. Cyberstalking, another form of harassment, occurs when people use the Internet and mobile devices to send or post messages of a threatening or sexual nature. Taken together, these forms of online abuse and crime comprise extremely challenging problems for society. Cyberstalking and Cyberbullying helps teens understand these issues, giving them information to protect themselves and avoid bullying or stalking others online. Examinations of real-life cases will introduce teens to 13-year-old Megan Meier, who was driven to suicide as a result of cyberbullying from a classmate's mother posing online as a teenage boy, and the arrest of a man charged with stalking movie star Uma Thurman both online and in person. These true examples, coupled with smart text, will give teens the knowledge they need to avoid being a victim or a perpetrator. Chapters and topics include: -Who bullies and stalks people online -How bullies and stalkers operate -The consequences of bullying and stalking -Efforts to fight online bullying and stalking -Precautions and warning signs. less...
    Amazon


    Living With the Internet by Samuel McQuade III PhD
    Amazon Says: The Internet plays a vital role in the everyday lives of millions of people who regularly use computers and other types of electronic information technology devices in their h more...
    Amazon Says: The Internet plays a vital role in the everyday lives of millions of people who regularly use computers and other types of electronic information technology devices in their homes, schools, and workplaces. The variety and affordability of these devices, along with compatible operating systems, software applications, and telecommunications technology, contribute to increasing use of the Internet. For teens who have grown up with this technology, it is an integral part of their lives, and it has a huge impact on how they live, learn, and socialize. Living with the Internet provides a broad look at the Internet, its history, and how it has shaped modern society. Explaining the technology behind the Internet, this new title explores its benefits and risks, and what the future of the Internet might mean in terms of privacy, information access, and lifestyle. Chapters and topics include: -How the Internet works -Key uses of the Internet -Where and how people connect to the Internet -Mobile and social computing -Future hopes and concerns for the Internet. less...
    Amazon


    Amazon Says: Like it or not, knowing how to make use of online tools without being overloaded with too much information is an essential ingredient to personal success in the twenty-first c more...
    Amazon Says: Like it or not, knowing how to make use of online tools without being overloaded with too much information is an essential ingredient to personal success in the twenty-first century. But how can we use digital media so that they make us empowered participants rather than passive receivers, grounded, well-rounded people rather than multitasking basket cases? In Net Smart, cyberculture expert Howard Rheingold shows us how to use social media intelligently, humanely, and, above all, mindfully. Mindful use of digital media means thinking about what we are doing, cultivating an ongoing inner inquiry into how we want to spend our time. Rheingold outlines five fundamental digital literacies, online skills that will help us do this: attention, participation, collaboration, critical consumption of information (or "crap detection"), and network smarts. He explains how attention works, and how we can use our attention to focus on the tiny relevant portion of the incoming tsunami of information. He describes the quality of participation that empowers the best of the bloggers, netizens, tweeters, and other online community participants; he examines how successful online collaborative enterprises contribute new knowledge to the world in new ways; and he teaches us a lesson on networks and network building. Rheingold points out that there is a bigger social issue at work in digital literacy, one that goes beyond personal empowerment. If we combine our individual efforts wisely, it could produce a more thoughtful society: countless small acts like publishing a Web page or sharing a link could add up to a public good that enriches everybody. less...
    Amazon


    Amazon Says: Now, more than ever, parents need help in navigating their kids’ online, media-saturated lives. Jim Steyer, founder and CEO of Common Sense Media, the nation’s lead more...
    Amazon Says: Now, more than ever, parents need help in navigating their kids’ online, media-saturated lives. Jim Steyer, founder and CEO of Common Sense Media, the nation’s leading kids-andmedia organization, and the father of four children, knows that many parents and teachers— unlike their technology-savvy kids—may be tourists in the online world. In this essential book, Steyer—a frequent commentator on national TV and radio—offers an engaging blend of straightforward advice and anecdotes that address what he calls RAP, the major pitfalls relating to kids’ use of media and technology: relationship issues, attention/ addiction problems, and the lack of privacy. Instead of shielding children completely from online images and messages, Steyer’s practical approach gives parents essential tools to help filter content, preserve good relationships with their children, and make common sense, value-driven judgments for kids of all ages. Not just about Facebook, this comprehensive, no-nonsense guide to the online world, media, and mobile devices belongs in the hands of all parents and educators raising kids in today’s digital age. less...
    Amazon


    Amazon Says: The Internet is amazing, but the risks you’ve heard about are real, too. You can avoid being a victim of online crime with the simple steps for staying safe online that you more...
    Amazon Says: The Internet is amazing, but the risks you’ve heard about are real, too. You can avoid being a victim of online crime with the simple steps for staying safe online that you’ll find in Using the Internet Safely For Seniors For Dummies.Here’s the guide you need to steer safely through the hazards so you can shop, visit, invest, explore, pay bills, and do dozens of other things online — more securely. Learn to protect yourself from online predators, create strong passwords, find reliable information, spot e-mail and phishing scams, and much more.Find out how to share photos and videos, chat with others, and participate in online discussions—securelySee how, with strong passwords and reasonable caution, online banking and bill-paying might be safer than the old wayLearn to install and set up a browser, use search engines effectively, and sidestep suspicious adsDiscover how personal information is collected and used by legitimate companies — and by crooksBe able to spot risks, find out how online criminals think, and know what makes you vulnerableEnjoy social networking sites without putting yourself at riskSpot reputable healthcare sites and avoid medical ID theft and scamsThere’s even a glossary of common computer terms and a guide to your rights when using the Internet. Using the Internet Safely For Seniors For Dummies helps you feel more secure by showing you how to protect yourself while enjoying the Web. less...
    Amazon


    Amazon Says: Technology is evolving faster than we are. As our mobile phones, mp3 players, cars, and digital cameras become more and more complex, we understand less and less about how the more...
    Amazon Says: Technology is evolving faster than we are. As our mobile phones, mp3 players, cars, and digital cameras become more and more complex, we understand less and less about how they actually work and what personal details these gadgets might reveal about us.Robert Vamosi, an award-winning journalist and analyst who has been covering digital security issues for more than a decade, shows us the dark side of all that digital capability and convenience. Hotel-room TV remotes can be used to steal our account information and spy on what we've been watching, toll-booth transponders receive unencrypted EZ Pass or FasTrak info that can be stolen and cloned, and our cars monitor and store data about our driving habits that can be used in court against us.When Gadgets Betray Us gives us a glimpse into the secret lives of our gadgets and helps us to better understand--and manage--these very real risks. less...
    Amazon

    • OnGuardOnline.gov
      A website published by the Federal Government to promote online security and safe internet practices.
    Print

    Comment about this page...